Generalized Tweakable Even-Mansour Cipher and Its Applications

被引:0
|
作者
Ping Zhang
Hong-Gang Hu
机构
[1] Chinese Academy of Sciences,Key Laboratory of Electromagnetic Space Information
[2] University of Science and Technology of China,School of Information Science and Technology
关键词
tweakable blockcipher; H-coefficients technique; authentication; authenticated encryption; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions H=HKK∈K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} $$\end{document} as a tweak and key schedule, and defined as y = HPHK((t1, t2), x) = P(x ⊕ HK(t1)) ⊕ HK(t2), where K is a key randomly chosen from a key space K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{K} $$\end{document}, (t1, t2) is a tweak chosen from a valid tweak space T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{T} $$\end{document}, x is a plaintext, and y is a ciphertext. We prove that HPH is a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on the security of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security and related-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication and authenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMAC and a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security, and related-key security.
引用
收藏
页码:1261 / 1277
页数:16
相关论文
共 50 条
  • [31] Security Analysis of Even-Mansour Structure Hash Functions
    Chen, Shiwei
    Cui, Ting
    Jin, Chenhui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 163 - 173
  • [32] Quantum attacks on Sum of Even-Mansour pseudorandom functions
    Shinagawa, Kazuo
    Iwata, Tetsu
    INFORMATION PROCESSING LETTERS, 2022, 173
  • [33] Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
    Dinur, Itai
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 439 - 457
  • [34] Quantum attacks on two-round even-mansour
    Cai, BinBin
    Gao, Fei
    Leander, Gregor
    FRONTIERS IN PHYSICS, 2022, 10
  • [35] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
  • [36] Quantum key recovery attacks on tweakable Even–Mansour ciphers
    Ping Zhang
    Yiyuan Luo
    Quantum Information Processing, 22
  • [37] Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 17 - 26
  • [38] The Related-Key Security of Iterated Even-Mansour Ciphers
    Farshim, Pooya
    Procter, Gordon
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 342 - 363
  • [39] MB plus : Enhanced Multibridge Attack for Even-Mansour Schemes
    Wang, Sitao
    Zhang, Yao
    Zhang, Xiao
    Zheng, Zhiming
    PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 384 - 388
  • [40] Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes
    Dinur, Itai
    Dunkelman, Orr
    Keller, Nathan
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2016, 29 (04) : 697 - 728